Libraries tagged by Algorithem

algorithmia/algorithmia

9 Favers
10421 Downloads

PHP Client for Algorithmia.com

Go to Download


web-token/jwt-signature-algorithm-experimental

1 Favers
247484 Downloads

Experimental Signature Algorithms the JWT Framework.

Go to Download


web-token/jwt-encryption-algorithm-experimental

1 Favers
233002 Downloads

Experimental Key and Content Encryption Algorithms the JWT Framework.

Go to Download


uestla/simplex-calculator

42 Favers
3403 Downloads

Simple tool for linear programming problems solving

Go to Download


teknoo/recipe

4 Favers
26058 Downloads

Inspired by cooking, allows the creation of dynamics workflows, called here recipe, following the #east programming and using middleware, configurable via DI or any configuration, if a set of conditions (ingredients) are available.

Go to Download


flow-php/rdsl

1 Favers
26768 Downloads

PHP ETL - Remote DSL

Go to Download


flow-php/dremel

2 Favers
37444 Downloads

PHP ETL - Dremel algorithm implementation

Go to Download


edgaras/strsim

5 Favers
1342 Downloads

Collection of string similarity and distance algorithms in PHP including Levenshtein, Damerau-Levenshtein, Jaro-Winkler, and more

Go to Download


morrisonlevi/ardent

631 Favers
16261 Downloads

A healthy library for PHP

Go to Download


eloquent/lcs

17 Favers
351400 Downloads

An implementation of the 'longest common subsequence' algorithm for PHP.

Go to Download


yarri/my-blowfish

1 Favers
36387 Downloads

Simple class for passwords hashing and checking using Blowfish algorithm

Go to Download


triun/longest-common-substring

3 Favers
45397 Downloads

PHP implementation of an algorithm to solve the `longest common substring` problem.

Go to Download


syspass/plugin-authenticator

18 Favers
9222 Downloads

2FA authentication plugin for sysPass based on TOTP algorithm (RFC 6238)

Go to Download


stymiee/php-simple-encryption

44 Favers
6466 Downloads

The PHP Simple Encryption library is designed to simplify the process of encrypting and decrypting data while ensuring best practices are followed. By default is uses a secure encryption algorithm and generates a cryptologically strong initialization vector so developers do not need to becomes experts in encryption to securely store sensitive data.

Go to Download


securepoint/token-bucket

0 Favers
15231 Downloads

Implementation of the Token Bucket algorithm.

Go to Download


<< Previous Next >>